Security
Cybersecurity has been a challenge from the beginning of IT and it will be until the end. It all started with endpoint and network security, but today we are also dealing with cloud security and training our employees to incorporate good security practices. All these new technologies that help us innovate also help cybercriminals and state-sponsored hackers get new tools that they can use to access our systems and, in the worst cases, gain access to our most valuable data and trade secrets. Moreover, with new legislation such as GDPR, you have to make sure everything is secure or you will not only lose your reputation, but you could also be fined by the government. In short, protecting IT environments is more important than ever.
Timeline
SentinelOne acquires PingSafe and takes big step in cloud security
CNAPP from PingSafe fits seamlessly into SentinelOne's existing cloud security offering, bringing an innovati...
GKE patch necessary: hackers can control Kubernetes clusters
Google has fixed two severe vulnerabilities in the Google Kubernetes Engine. Patching is wise, as an attacker...
Vulnerability in Black Basta ransomware enables decryption
Researchers have developed a tool to decrypt files affected by Black Basta ransomware. SRLabs has exploite...
Exploit provides access to Google accounts: password change doesn’t help
Several malware families can give hackers access to Google accounts. For this, the malware abuses an OAuth2 f...
“Darktrace has no competition, only partnerships”
Cybersecurity needs to get smarter. AI plays an important role in this. At Darktrace, they are tackling this ...
Microsoft blocks MSIX protocol handler
Microsoft has again blocked the MSIX ms-appinstaller protocol handler to prevent hackers from using it to inf...
Update: Barracuda Gateways hit by another vulnerability
Barracuda Networks' Email Security Gateways are again affected by a zero-day vulnerability that allows hacker...
iPhone spyware used unknown feature in Apple’s SoC for years
An undocumented feature in the Apple SoCs of iPhones has been a key component in a prominent spyware campaign...
Emergency systems offline after ransomware attack
Three German hospitals are victims of a ransomware attack. For security reasons, all systems have been shut d...
Data breaches aren’t setting records anymore, but there are more victims than ever
The biggest data breaches of all time almost all took place between 2018 and 2020. Since then, no leak has ma...